49 research outputs found

    Emerging Applications of Reversible Data Hiding

    Full text link
    Reversible data hiding (RDH) is one special type of information hiding, by which the host sequence as well as the embedded data can be both restored from the marked sequence without loss. Beside media annotation and integrity authentication, recently some scholars begin to apply RDH in many other fields innovatively. In this paper, we summarize these emerging applications, including steganography, adversarial example, visual transformation, image processing, and give out the general frameworks to make these operations reversible. As far as we are concerned, this is the first paper to summarize the extended applications of RDH.Comment: ICIGP 201

    Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model

    Get PDF
    In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance

    Defenses against Covert-Communications in Multimedia and Sensor Networks

    Get PDF
    Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the dissertation looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This dissertation also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert-communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption
    corecore